wine/dlls/ntdll virtual.c

Alexandre Julliard julliard at winehq.org
Wed Feb 11 14:38:42 CST 2004


Mike Hearn <mike at theoretic.com> writes:

> According to the exec-shield paper, its effects can include revealing
> "bugs in applications that assume PROT_READ implies PROT_EXEC" due to the
> funky things it does with relocations into the ASCII-armour. Not sure but
> it might be worth ensuring mprotect is called afterwards....

mprotect is always called, and anyway the area is allocated with
PROT_EXEC already so it shouldn't make any difference.

-- 
Alexandre Julliard
julliard at winehq.com



More information about the wine-devel mailing list